AUTHOR ARCHIVES

Joseph Marks

Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.

January 3, 2012
FROM NEXTGOV
In the "can't believe we missed it" department, the NORAD Tracks Santa app has evidently been removed from the iTunes app store until Santa begins his journey again next year. According to its description on an index page for government-built mobile applications, the North American Aerospace Defense Command-designed app includes...

January 3, 2012
FROM NEXTGOV
After a taciturn first few months as federal chief information officer, Steven VanRoekel appears to be warming to the public stage with two speeches scheduled in just three days next week. The CIO is slated to speak Wednesday at a government technology panel connected with the Consumer Electronics Association's CES...

January 3, 2012
FROM NEXTGOV
This story has been updated. Six months after starting the mammoth task of moving the 17,000-employee General Services Administration to a cloud-based email system, Chief Information Officer Casey Coleman's strongest takeaway is about pacing. The government management agency's phased migration to the new Google Apps for Government email system --...

January 3, 2012
FROM NEXTGOV
Around the time he took office as the nation's 28th president in 1913, Woodrow Wilson wrote that "government ought to be all outside and no inside." That simple binary made sense 99 years ago. At the time, the results of government studies, executive orders and meeting notes were either available...

January 1, 2012
Cutting the number of websites is just the first step. Around the time he took office as the nation's 28th president in 1913, Woodrow Wilson wrote that "government ought to be all outside and no inside." That simple binary made sense 99 years ago. At the time, the results of...

December 27, 2011
FROM NEXTGOV
Gartner analyst Andrea Di Maio has put together a list of his personal top 10 Gov 2.0 advances for 2011. This is Di Maio's third annual list and, for people who spend most of their time focused on U.S. government information technology and social media, it's a great primer on...

December 23, 2011
FROM NEXTGOV
One irony of the digital revolution is that it has made the once relatively simple concept of government transparency significantly more opaque. In the old days of paper, transparency generally meant two things: meetings and documents. The game was about what public officials would show you and what they wouldn't...

December 23, 2011
One irony of the digital revolution is that it has made the once relatively simple concept of government transparency significantly more opaque. In the old days of paper, transparency generally meant two things: meetings and documents. The game was about what public officials would show you and what they wouldn't...

December 21, 2011
FROM NEXTGOV
The Center for American Progress think tank and the transparency group Public.Resources.Org want to turn the vast holdings of the Library of Congress, the Smithsonian Institution, the Government Printing Office and other government agencies into the core of a national digital public library. "We are not necessarily suggesting that the...

December 21, 2011
FROM NEXTGOV
This story has been updated. The White House plans to close 40 percent of roughly 3,100 federal data centers by 2015,according to a new blog post by federal Chief Information Officer Steven VanRoekel. That amounts to shuttering about 1,200 centers. The government expects to save $5 billion overall through the...

Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.